No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Log Reference

S9300, S9300E, and S9300X V200R010C00

This document provides the explanations, causes, and recommended actions of logs on the product.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).



SECE/4/IPSG_DROP_PACKET:IP packets,dropped by IPSG.(SourceInterface=[STRING],DropPacketNumber=[ULONG],DroptTime=[STRING])


IP packets are discarded by IPSG.


Parameter Name Parameter Meaning


Indicates the source interface of the packets.


Indicates the number of discarded packets.


Indicates the packet discard time.

Possible Causes

The device receives an IP packet that does not match any entry in the DHCP snooping binding table.


  • Find out the interface where attacks occur according to Interface in the alarm message.
  • Run the display dhcp snooping user-bind command to check whether users who are not in the DHCP snooping binding table range are connected.
  • If new users are connected, run related DHCP snooping commands to generate the DHCP snooping binding entry.
Updated: 2019-08-21

Document ID: EDOC1000142069

Views: 540041

Downloads: 37

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next